Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.116.3.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.116.3.253.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 23:59:20 CST 2025
;; MSG SIZE  rcvd: 106
Host info
253.3.116.145.in-addr.arpa domain name pointer 145.116.6.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.9.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.10.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.8.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.12.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.0.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.4.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.5.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.3.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.15.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.7.Woonstichting.de.Key.invalid.
253.3.116.145.in-addr.arpa domain name pointer 145.116.14.Woonst
Nslookup info:
b'253.3.116.145.in-addr.arpa	name = 145.116.13.woonstichting.de.key.invalid.
253.3.116.145.in-addr.arpa	name = 145.116.14.woonstichting.de.key.invalid.
253.3.116.145.in-addr.arpa	name = 145.116.15.woonstichting.de.key.invalid.
253.3.116.145.in-addr.arpa	name = 145.116.10.woonstichting.de.key.invalid.
253.3.116.145.in-addr.arpa	name = 145.116.11.woonstichting.de.key.invalid.
253.3.116.145.in-addr.arpa	name = 145.116.12.woonstichting.de.key.invalid.
253.3.116.145.in-addr.arpa	name = 145.116.3.woonstichting.de.key.invalid.
253.3.116.145.in-addr.arpa	name = 145.116.early-registration.of.surfnet.invalid.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
119.136.16.75 attackbotsspam
2020-02-13T01:49:13.6581621495-001 sshd[60121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.136.16.75  user=root
2020-02-13T01:49:15.2540151495-001 sshd[60121]: Failed password for root from 119.136.16.75 port 2242 ssh2
2020-02-13T01:52:59.6835861495-001 sshd[60340]: Invalid user elata from 119.136.16.75 port 2243
2020-02-13T01:52:59.6868001495-001 sshd[60340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.136.16.75
2020-02-13T01:52:59.6835861495-001 sshd[60340]: Invalid user elata from 119.136.16.75 port 2243
2020-02-13T01:53:01.6428971495-001 sshd[60340]: Failed password for invalid user elata from 119.136.16.75 port 2243 ssh2
2020-02-13T01:56:26.5469551495-001 sshd[60516]: Invalid user austin from 119.136.16.75 port 2244
2020-02-13T01:56:26.5553691495-001 sshd[60516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.136.16.75
2020-02-13T01:56:26.54
...
2020-02-13 19:40:31
104.131.84.59 attack
unauthorized connection attempt
2020-02-13 19:07:19
2607:f298:5:100f::2de:63f6 attack
xmlrpc attack
2020-02-13 19:40:58
217.182.68.93 attackspam
Feb 13 10:26:52 vlre-nyc-1 sshd\[21596\]: Invalid user furukawa from 217.182.68.93
Feb 13 10:26:52 vlre-nyc-1 sshd\[21596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.68.93
Feb 13 10:26:54 vlre-nyc-1 sshd\[21596\]: Failed password for invalid user furukawa from 217.182.68.93 port 48580 ssh2
Feb 13 10:28:56 vlre-nyc-1 sshd\[21665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.68.93  user=root
Feb 13 10:28:58 vlre-nyc-1 sshd\[21665\]: Failed password for root from 217.182.68.93 port 40796 ssh2
...
2020-02-13 19:09:59
101.205.152.175 attackspambots
unauthorized connection attempt
2020-02-13 19:20:29
118.25.10.238 attackspam
Hacking
2020-02-13 19:24:10
194.166.255.53 attack
Feb 13 12:58:15 www sshd\[55840\]: Invalid user denis from 194.166.255.53Feb 13 12:58:17 www sshd\[55840\]: Failed password for invalid user denis from 194.166.255.53 port 45276 ssh2Feb 13 13:08:06 www sshd\[55874\]: Failed password for root from 194.166.255.53 port 55630 ssh2
...
2020-02-13 19:22:46
202.175.46.170 attackspam
<6 unauthorized SSH connections
2020-02-13 19:01:03
171.242.112.177 attack
Unauthorized connection attempt from IP address 171.242.112.177 on Port 445(SMB)
2020-02-13 19:41:21
36.66.69.33 attackbots
"SSH brute force auth login attempt."
2020-02-13 19:15:05
75.119.218.246 attackbots
75.119.218.246 - - \[13/Feb/2020:08:25:20 +0100\] "POST /wp-login.php HTTP/1.0" 200 7556 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
75.119.218.246 - - \[13/Feb/2020:08:25:23 +0100\] "POST /wp-login.php HTTP/1.0" 200 7381 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
75.119.218.246 - - \[13/Feb/2020:08:25:26 +0100\] "POST /wp-login.php HTTP/1.0" 200 7376 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-02-13 19:00:09
218.94.158.2 attackspam
Feb 13 06:13:16 roki sshd[24050]: refused connect from 218.94.158.2 (218.94.158.2)
Feb 13 06:17:31 roki sshd[24618]: refused connect from 218.94.158.2 (218.94.158.2)
Feb 13 06:21:57 roki sshd[25258]: refused connect from 218.94.158.2 (218.94.158.2)
Feb 13 06:26:42 roki sshd[25962]: refused connect from 218.94.158.2 (218.94.158.2)
Feb 13 06:30:11 roki sshd[26500]: refused connect from 218.94.158.2 (218.94.158.2)
...
2020-02-13 19:02:29
92.39.241.198 attack
Brute force attempt
2020-02-13 19:36:20
46.101.124.220 attackbotsspam
Feb 13 06:48:50 cvbnet sshd[8511]: Failed password for root from 46.101.124.220 port 53227 ssh2
...
2020-02-13 19:14:50
41.203.156.254 attack
Feb 13 05:47:13 vps647732 sshd[21643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.203.156.254
Feb 13 05:47:15 vps647732 sshd[21643]: Failed password for invalid user da from 41.203.156.254 port 57360 ssh2
...
2020-02-13 19:19:16

Recently Reported IPs

157.144.250.112 195.178.6.151 190.103.77.85 255.22.122.211
161.173.71.72 31.71.212.69 125.87.32.161 90.229.239.79
67.140.99.86 82.45.91.233 7.2.187.86 172.163.161.225
179.21.225.199 215.78.130.204 124.170.35.191 87.125.109.15
139.74.145.233 145.104.19.1 16.200.234.178 210.51.222.118